From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-3.7 required=3.0 tests=BAYES_00,FROM_LOCAL_HEX, HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS autolearn=no autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 44AEEC04FF3 for ; Mon, 24 May 2021 14:33:32 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by mail.kernel.org (Postfix) with ESMTP id 1FAF06108B for ; Mon, 24 May 2021 14:33:32 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232997AbhEXOe5 (ORCPT ); Mon, 24 May 2021 10:34:57 -0400 Received: from mail-io1-f72.google.com ([209.85.166.72]:51858 "EHLO mail-io1-f72.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232906AbhEXOex (ORCPT ); Mon, 24 May 2021 10:34:53 -0400 Received: by mail-io1-f72.google.com with SMTP id h7-20020a5d9e070000b029041a1f6bccc8so27576872ioh.18 for ; Mon, 24 May 2021 07:33:25 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:date:message-id:subject:from:to; bh=mzMzgGXGzf6LXhHO5i6yc8Y+EDUJAYcIfexi+vE47CU=; b=FWr1laZa6S7NL4LV6aNj8n56eqNcSVZjWGudZPtW2K9zaFEmmQYlWwuGkmMiOOiAxs X9dJf6aGZmrZhge4Wz6KSh0obcXLqsEadj19RcEEdjm8bD0ncb30AWYz+sAml2uH/Wh7 NMgD8s+fMNmNR3ogHFVeRigOUYstisixcldGBaKkHtmTOFU9SivM6YMMTxxkdpV6SuVN RNRmOtBzdF+BqWXI4A/EJ2zYkFc92NCCktQ5wlsbRkGJlzNyLekSDSj4kGiGHZ1txljC lEDIzWt7CMDf0SSD1qN/UUVZuYAG2yObKPTaO7Hg2qVDHc0arHk55NhqK80VU0opOLt+ Ajfw== X-Gm-Message-State: AOAM5335mHS86kboCwtGbC71qceTOAKOLuTz+gvoRirUhOpTzk98TcY8 V7UhXvkrOWW2vjTF2sjmfkxGMHFhWUWiObUKjVSDkAI4ao9o X-Google-Smtp-Source: ABdhPJwcLmlxYie5V2pawuvy04hy/JhXmHluK7avvoMDLz8HPqTWiVk6pB4ev4axH1fIOY+cFZD0NJBTXl7Xe+dCdaOexF+vy7zQ MIME-Version: 1.0 X-Received: by 2002:a05:6e02:b47:: with SMTP id f7mr18755134ilu.261.1621866805007; Mon, 24 May 2021 07:33:25 -0700 (PDT) Date: Mon, 24 May 2021 07:33:24 -0700 X-Google-Appengine-App-Id: s~syzkaller X-Google-Appengine-App-Id-Alias: syzkaller Message-ID: <000000000000c91e6f05c3144acc@google.com> Subject: [syzbot] memory leak in ip_vs_add_service From: syzbot To: coreteam@netfilter.org, davem@davemloft.net, fw@strlen.de, horms@verge.net.au, ja@ssi.bg, kadlec@netfilter.org, kuba@kernel.org, linux-kernel@vger.kernel.org, lvs-devel@vger.kernel.org, netdev@vger.kernel.org, netfilter-devel@vger.kernel.org, pablo@netfilter.org, syzkaller-bugs@googlegroups.com Content-Type: text/plain; charset="UTF-8" Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hello, syzbot found the following issue on: HEAD commit: c3d0e3fd Merge tag 'fs.idmapped.mount_setattr.v5.13-rc3' o.. git tree: upstream console output: https://syzkaller.appspot.com/x/log.txt?x=148d0bd7d00000 kernel config: https://syzkaller.appspot.com/x/.config?x=ae7b129a135ab06b dashboard link: https://syzkaller.appspot.com/bug?extid=e562383183e4b1766930 syz repro: https://syzkaller.appspot.com/x/repro.syz?x=15585a4bd00000 C reproducer: https://syzkaller.appspot.com/x/repro.c?x=13900753d00000 IMPORTANT: if you fix the issue, please add the following tag to the commit: Reported-by: syzbot+e562383183e4b1766930@syzkaller.appspotmail.com BUG: memory leak unreferenced object 0xffff888115227800 (size 512): comm "syz-executor263", pid 8658, jiffies 4294951882 (age 12.560s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] kmalloc include/linux/slab.h:556 [inline] [] kzalloc include/linux/slab.h:686 [inline] [] ip_vs_add_service+0x598/0x7c0 net/netfilter/ipvs/ip_vs_ctl.c:1343 [] do_ip_vs_set_ctl+0x810/0xa40 net/netfilter/ipvs/ip_vs_ctl.c:2570 [] nf_setsockopt+0x68/0xa0 net/netfilter/nf_sockopt.c:101 [] ip_setsockopt+0x259/0x1ff0 net/ipv4/ip_sockglue.c:1435 [] raw_setsockopt+0x18c/0x1b0 net/ipv4/raw.c:857 [] __sys_setsockopt+0x1b0/0x360 net/socket.c:2117 [] __do_sys_setsockopt net/socket.c:2128 [inline] [] __se_sys_setsockopt net/socket.c:2125 [inline] [] __x64_sys_setsockopt+0x22/0x30 net/socket.c:2125 [] do_syscall_64+0x3a/0xb0 arch/x86/entry/common.c:47 [] entry_SYSCALL_64_after_hwframe+0x44/0xae --- This report is generated by a bot. It may contain errors. See https://goo.gl/tpsmEJ for more information about syzbot. syzbot engineers can be reached at syzkaller@googlegroups.com. syzbot will keep track of this issue. See: https://goo.gl/tpsmEJ#status for how to communicate with syzbot. syzbot can test patches for this issue, for details see: https://goo.gl/tpsmEJ#testing-patches